O'Reilly logo

Penetration Testing with Perl by Swizec Teller

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

What you need for this book

The physical requirements in this book are a single 802.11 Wi-Fi router that is capable for WPA2 encryption, two workstations (which can be virtual if networked properly) that will act as an attacker and a victim, a smartphone device, an 802.11 Wi-Fi adapter that is supported by the Linux OS driver for packet injection, network shared storage, and a connection to the Internet. Hardware attacking includes networked device software, which includes simple HTTP login forms, such as a router and a switch, and smartphone administration software.

The software required for the attacker is a simple penetration-testing-themed live disk, such as WEAKERTH4N Linux (used throughout this book), which is freely available online. This ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required